نتایج جستجو برای: delegation
تعداد نتایج: 3322 فیلتر نتایج به سال:
Trust mechanisms can allow an agent to identify the most trustworthy entity to which a task should be delegated. Now this entity may further delegate the task, ultimately resulting in a delegation chain representing the sub-delegation process. Such delegation chains present a problem for current trust evaluation mechanisms, as they typically which reward or penalise a single agent rather than s...
In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure. This means that security of the shared resources is of prime importance. Frequent delegation of tasks among users must be anticipated as most nomadic environments are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not o...
This paper studies delegation of authority in a setting that combines the incentive view of delegation pioneered by Aghion and Tirole [1997], the informational theory of delegation emphasized by Dessein [2002], the learning possibility put forth by Aghion, Dewatripont, and Rey [2004] and the career concerns literature spawned by Holmström [1999]. I show that the principal may choose delegation ...
The paper presents revocation schemes in role-based access control models. We are particularly interested in two key issues: how to perform revocation and how to manage the revocation policy. We show how to deal with these two aspects in the delegation model based on the OrBAC formalism and its administration licence concept. This model provides means to manage several delegation types, such as...
Delegation of access control (i.e. transferring access rights on a resource to another tenant) is crucial to efficiently decentralize the access control management in large and dynamic scenarios. Most of the delegation methods available in the literature are based on the RBAC or ABAC models. However, their applicability can be hampered by: i) the effort required to manage and enforce multiple r...
Object composition a well-known programming technique for supporting dynamic adaptation in statically typed class-based object-oriented programming languages suffers from two non-trivial problems; the common-self problem and the object reference update problem. Recently, it has been shown that the common-self problem can be solved for object composition in statically typed class-based languages...
An anonymous delegation system enables individuals to retrieve rights and to delegate different subparts of these rights to different entities. The delegation procedure is anonymous, such that no collusion of entities can track an individual’s delegation behavior. On the other hand, it is ensured that a user cannot abuse her delegation capabilities. This paper introduces a general delegation mo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید